Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive analysis of Windows Phone 7 security, revealing hidden internals through reverse engineering. Explores potential vulnerabilities and exploitation techniques in the OS and vendor customizations.
Explores hardware backdooring through Rakshasa malware, demonstrating permanent BIOS infection, NX bit disabling, and security lowering across various motherboards using open-source components like Coreboot.
Explore SSRF vulnerabilities in business-critical applications, focusing on SAP systems. Learn about XXE Tunneling and its potential to bypass security restrictions, with practical examples and attack scenarios.
Explore recent Java vulnerabilities, exploitation techniques, and malware trends. Learn about sandbox evasion, multi-platform attacks, and challenges in analyzing obfuscated Java exploits.
Analysis of malware targeting activists during Middle Eastern uprisings, exploring distribution methods and impact on digital dissent and online communities.
Visionary security experts discuss emerging threats, technological shifts, and societal impacts on cybersecurity over the next 15 years, offering insights into future challenges and opportunities in the field.
Explore techniques for probing cellular networks, uncovering diverse connected devices, and discussing security implications of findings from network investigations.
Explore browser exploitation techniques using MITM attacks and the BeEF Framework. Learn to hook browsers without social engineering or XSS, and maintain connections for advanced penetration testing.
Explore automation and APIs for enhancing security through centralized management, testing, and evidence-driven approaches. Learn to leverage open-source tools and protocols for efficient vulnerability detection and faster recovery.
Explore vulnerabilities in Microsoft Exchange's mobile device management, focusing on remote wipe functionality and potential exploitation through policy updates without authentication.
Explore ethical hacking through a card game that simulates security audits and consulting. Learn about diverse hacking skills, mission challenges, and cybersecurity concepts in an engaging, entertaining format.
Innovative C library for SQL injection detection using lexical analysis, offering high precision and accuracy. Trained on real attacks, it categorizes threats and provides templates for new attack detection.
Deep dive into popular web exploit toolkits, analyzing construction, shellcodes, obfuscations, and exploits. Explore trends, data harvesting methods, and emerging players in cybercriminal landscape.
Explore advanced intrusion detection techniques using the attacker plane and kill chain concepts to improve cybersecurity effectiveness beyond traditional vendor solutions.
Explore passive Bluetooth monitoring in Scapy using Python extensions and Ubertooth dongle, enabling interactive observation and development of Bluetooth auditing and pentesting tools.
Get personalized course recommendations, track subjects and courses with reminders, and more.